Question with Correct and
Verified Answers
"An organization wants to prevent unauthorized access to its internal network from external
sources. What security measure should be implemented? - Correct Answer Network
Segmentation"
"A company aims to detect and respond to potential security incidents on its network. What
technology is specifically designed for this purpose? - Correct Answer Intrusion Detection
System (IDS)"
An organization wants to ensure that only authorized personnel can access sensitive data
stored in a database. What security measure should be implemented for protecting data at
rest? - Correct Answer Access controls"
"A company wishes to secure communication between its two branch offices over the
internet. What technology should be employed for protecting data in motion? - Correct
Answer Virtual Private Network (VPN)"
"A web application needs to identify and prevent SQL injection attacks. What security
measure is most appropriate for protecting data in use? - Correct Answer Application-level
encryption"
"An attacker intercepts and alters the communication between a user and a website,
injecting malicious scripts. What type of attack is this? - Correct Answer Cross-Site Scripting
(XSS)"
"A hacker gains access to a network by exploiting a vulnerability in the wireless security
protocols. What type of attack is this? - Correct Answer Man-in-the-Middle (MitM)"
"An attacker gains access to a user's account by systematically trying all possible password
combinations. What type of attack is this? - Correct Answer Brute Force"
"A malicious actor gains unauthorized access to a server and deletes critical files, causing
data loss. What type of attack is this? - Correct Answer Deletion"
, "An attacker gains access to a database and alters records to manipulate financial
transactions. What type of attack is this? - Correct Answer Modification"
"A hacker gains access to sensitive information by pretending to be a trusted employee.
What type of attack is this? - Correct Answer Spoofing"
"An attacker gains access to a network by exploiting a vulnerability in a software
application's code. What type of attack is this? - Correct Answer Injection"
"A hacker gains access to sensitive emails between two employees, extracting confidential
information. What type of attack is this? - Correct Answer Eavesdropping"
"An attacker sends a fraudulent email to an employee, tricking them into revealing sensitive
login credentials. What type of attack is this? - Correct Answer Phishing"
"A hacker gains access to a system by manipulating user input to execute unintended
commands. What type of attack is this? - Correct Answer Injection"
"A malicious actor floods a network with traffic from multiple sources, overwhelming its
capacity. What type of attack is this? - Correct Answer DDoS"
"An attacker gains access to a system by impersonating a delivery person and following an
employee through a secured entrance. What type of attack is this? - Correct Answer
Tailgating"
"A hacker gains unauthorized access to a system and alters critical system files, causing
system malfunctions. What type of attack is this? - Correct Answer Modification"
"An attacker gains access to a system by exploiting a vulnerability in the application's code,
allowing them to execute arbitrary commands. What type of attack is this? - Correct Answer
Buffer Overflow"
"A security analyst is conducting a vulnerability assessment on a network. What tool is
commonly used to identify open ports on a system? - Correct Answer Nmap"
"A company wants to ensure that employees' login credentials are securely transmitted over
the internet. What technology should be used for this purpose? - Correct Answer SSL/TLS
encryption"